| 1 | /* SPDX-License-Identifier: GPL-2.0+ */ | 
|---|
| 2 | /* | 
|---|
| 3 | * MACsec netdev header, used for h/w accelerated implementations. | 
|---|
| 4 | * | 
|---|
| 5 | * Copyright (c) 2015 Sabrina Dubroca <sd@queasysnail.net> | 
|---|
| 6 | */ | 
|---|
| 7 | #ifndef _NET_MACSEC_H_ | 
|---|
| 8 | #define _NET_MACSEC_H_ | 
|---|
| 9 |  | 
|---|
| 10 | #include <linux/u64_stats_sync.h> | 
|---|
| 11 | #include <linux/if_vlan.h> | 
|---|
| 12 | #include <uapi/linux/if_link.h> | 
|---|
| 13 | #include <uapi/linux/if_macsec.h> | 
|---|
| 14 |  | 
|---|
| 15 | #define MACSEC_DEFAULT_PN_LEN 4 | 
|---|
| 16 | #define MACSEC_XPN_PN_LEN 8 | 
|---|
| 17 |  | 
|---|
| 18 | #define MACSEC_NUM_AN 4 /* 2 bits for the association number */ | 
|---|
| 19 |  | 
|---|
| 20 | #define MACSEC_SCI_LEN 8 | 
|---|
| 21 | #define MACSEC_PORT_ES (htons(0x0001)) | 
|---|
| 22 |  | 
|---|
| 23 | #define MACSEC_TCI_VERSION 0x80 | 
|---|
| 24 | #define MACSEC_TCI_ES      0x40 /* end station */ | 
|---|
| 25 | #define MACSEC_TCI_SC      0x20 /* SCI present */ | 
|---|
| 26 | #define MACSEC_TCI_SCB     0x10 /* epon */ | 
|---|
| 27 | #define MACSEC_TCI_E       0x08 /* encryption */ | 
|---|
| 28 | #define MACSEC_TCI_C       0x04 /* changed text */ | 
|---|
| 29 | #define MACSEC_AN_MASK     0x03 /* association number */ | 
|---|
| 30 | #define MACSEC_TCI_CONFID  (MACSEC_TCI_E | MACSEC_TCI_C) | 
|---|
| 31 |  | 
|---|
| 32 | #define MACSEC_DEFAULT_ICV_LEN 16 | 
|---|
| 33 |  | 
|---|
| 34 | typedef u64 __bitwise sci_t; | 
|---|
| 35 | typedef u32 __bitwise ssci_t; | 
|---|
| 36 |  | 
|---|
| 37 | struct metadata_dst; | 
|---|
| 38 |  | 
|---|
| 39 | typedef union salt { | 
|---|
| 40 | struct { | 
|---|
| 41 | ssci_t ssci; | 
|---|
| 42 | __be64 pn; | 
|---|
| 43 | } __packed; | 
|---|
| 44 | u8 bytes[MACSEC_SALT_LEN]; | 
|---|
| 45 | } __packed salt_t; | 
|---|
| 46 |  | 
|---|
| 47 | typedef union pn { | 
|---|
| 48 | struct { | 
|---|
| 49 | #if defined(__LITTLE_ENDIAN_BITFIELD) | 
|---|
| 50 | u32 lower; | 
|---|
| 51 | u32 upper; | 
|---|
| 52 | #elif defined(__BIG_ENDIAN_BITFIELD) | 
|---|
| 53 | u32 upper; | 
|---|
| 54 | u32 lower; | 
|---|
| 55 | #else | 
|---|
| 56 | #error	"Please fix <asm/byteorder.h>" | 
|---|
| 57 | #endif | 
|---|
| 58 | }; | 
|---|
| 59 | u64 full64; | 
|---|
| 60 | } pn_t; | 
|---|
| 61 |  | 
|---|
| 62 | /** | 
|---|
| 63 | * struct macsec_key - SA key | 
|---|
| 64 | * @id: user-provided key identifier | 
|---|
| 65 | * @tfm: crypto struct, key storage | 
|---|
| 66 | * @salt: salt used to generate IV in XPN cipher suites | 
|---|
| 67 | */ | 
|---|
| 68 | struct macsec_key { | 
|---|
| 69 | u8 id[MACSEC_KEYID_LEN]; | 
|---|
| 70 | struct crypto_aead *tfm; | 
|---|
| 71 | salt_t salt; | 
|---|
| 72 | }; | 
|---|
| 73 |  | 
|---|
| 74 | struct macsec_rx_sc_stats { | 
|---|
| 75 | __u64 InOctetsValidated; | 
|---|
| 76 | __u64 InOctetsDecrypted; | 
|---|
| 77 | __u64 InPktsUnchecked; | 
|---|
| 78 | __u64 InPktsDelayed; | 
|---|
| 79 | __u64 InPktsOK; | 
|---|
| 80 | __u64 InPktsInvalid; | 
|---|
| 81 | __u64 InPktsLate; | 
|---|
| 82 | __u64 InPktsNotValid; | 
|---|
| 83 | __u64 InPktsNotUsingSA; | 
|---|
| 84 | __u64 InPktsUnusedSA; | 
|---|
| 85 | }; | 
|---|
| 86 |  | 
|---|
| 87 | struct macsec_rx_sa_stats { | 
|---|
| 88 | __u32 InPktsOK; | 
|---|
| 89 | __u32 InPktsInvalid; | 
|---|
| 90 | __u32 InPktsNotValid; | 
|---|
| 91 | __u32 InPktsNotUsingSA; | 
|---|
| 92 | __u32 InPktsUnusedSA; | 
|---|
| 93 | }; | 
|---|
| 94 |  | 
|---|
| 95 | struct macsec_tx_sa_stats { | 
|---|
| 96 | __u32 OutPktsProtected; | 
|---|
| 97 | __u32 OutPktsEncrypted; | 
|---|
| 98 | }; | 
|---|
| 99 |  | 
|---|
| 100 | struct macsec_tx_sc_stats { | 
|---|
| 101 | __u64 OutPktsProtected; | 
|---|
| 102 | __u64 OutPktsEncrypted; | 
|---|
| 103 | __u64 OutOctetsProtected; | 
|---|
| 104 | __u64 OutOctetsEncrypted; | 
|---|
| 105 | }; | 
|---|
| 106 |  | 
|---|
| 107 | struct macsec_dev_stats { | 
|---|
| 108 | __u64 OutPktsUntagged; | 
|---|
| 109 | __u64 InPktsUntagged; | 
|---|
| 110 | __u64 OutPktsTooLong; | 
|---|
| 111 | __u64 InPktsNoTag; | 
|---|
| 112 | __u64 InPktsBadTag; | 
|---|
| 113 | __u64 InPktsUnknownSCI; | 
|---|
| 114 | __u64 InPktsNoSCI; | 
|---|
| 115 | __u64 InPktsOverrun; | 
|---|
| 116 | }; | 
|---|
| 117 |  | 
|---|
| 118 | /** | 
|---|
| 119 | * struct macsec_rx_sa - receive secure association | 
|---|
| 120 | * @active: | 
|---|
| 121 | * @next_pn: packet number expected for the next packet | 
|---|
| 122 | * @lock: protects next_pn manipulations | 
|---|
| 123 | * @key: key structure | 
|---|
| 124 | * @ssci: short secure channel identifier | 
|---|
| 125 | * @stats: per-SA stats | 
|---|
| 126 | */ | 
|---|
| 127 | struct macsec_rx_sa { | 
|---|
| 128 | struct macsec_key key; | 
|---|
| 129 | ssci_t ssci; | 
|---|
| 130 | spinlock_t lock; | 
|---|
| 131 | union { | 
|---|
| 132 | pn_t next_pn_halves; | 
|---|
| 133 | u64 next_pn; | 
|---|
| 134 | }; | 
|---|
| 135 | refcount_t refcnt; | 
|---|
| 136 | bool active; | 
|---|
| 137 | struct macsec_rx_sa_stats __percpu *stats; | 
|---|
| 138 | struct macsec_rx_sc *sc; | 
|---|
| 139 | struct rcu_head rcu; | 
|---|
| 140 | }; | 
|---|
| 141 |  | 
|---|
| 142 | struct pcpu_rx_sc_stats { | 
|---|
| 143 | struct macsec_rx_sc_stats stats; | 
|---|
| 144 | struct u64_stats_sync syncp; | 
|---|
| 145 | }; | 
|---|
| 146 |  | 
|---|
| 147 | struct pcpu_tx_sc_stats { | 
|---|
| 148 | struct macsec_tx_sc_stats stats; | 
|---|
| 149 | struct u64_stats_sync syncp; | 
|---|
| 150 | }; | 
|---|
| 151 |  | 
|---|
| 152 | /** | 
|---|
| 153 | * struct macsec_rx_sc - receive secure channel | 
|---|
| 154 | * @sci: secure channel identifier for this SC | 
|---|
| 155 | * @active: channel is active | 
|---|
| 156 | * @sa: array of secure associations | 
|---|
| 157 | * @stats: per-SC stats | 
|---|
| 158 | */ | 
|---|
| 159 | struct macsec_rx_sc { | 
|---|
| 160 | struct macsec_rx_sc __rcu *next; | 
|---|
| 161 | sci_t sci; | 
|---|
| 162 | bool active; | 
|---|
| 163 | struct macsec_rx_sa __rcu *sa[MACSEC_NUM_AN]; | 
|---|
| 164 | struct pcpu_rx_sc_stats __percpu *stats; | 
|---|
| 165 | refcount_t refcnt; | 
|---|
| 166 | struct rcu_head rcu_head; | 
|---|
| 167 | }; | 
|---|
| 168 |  | 
|---|
| 169 | /** | 
|---|
| 170 | * struct macsec_tx_sa - transmit secure association | 
|---|
| 171 | * @active: | 
|---|
| 172 | * @next_pn: packet number to use for the next packet | 
|---|
| 173 | * @lock: protects next_pn manipulations | 
|---|
| 174 | * @key: key structure | 
|---|
| 175 | * @ssci: short secure channel identifier | 
|---|
| 176 | * @stats: per-SA stats | 
|---|
| 177 | */ | 
|---|
| 178 | struct macsec_tx_sa { | 
|---|
| 179 | struct macsec_key key; | 
|---|
| 180 | ssci_t ssci; | 
|---|
| 181 | spinlock_t lock; | 
|---|
| 182 | union { | 
|---|
| 183 | pn_t next_pn_halves; | 
|---|
| 184 | u64 next_pn; | 
|---|
| 185 | }; | 
|---|
| 186 | refcount_t refcnt; | 
|---|
| 187 | bool active; | 
|---|
| 188 | struct macsec_tx_sa_stats __percpu *stats; | 
|---|
| 189 | struct rcu_head rcu; | 
|---|
| 190 | }; | 
|---|
| 191 |  | 
|---|
| 192 | /** | 
|---|
| 193 | * struct macsec_tx_sc - transmit secure channel | 
|---|
| 194 | * @active: | 
|---|
| 195 | * @encoding_sa: association number of the SA currently in use | 
|---|
| 196 | * @encrypt: encrypt packets on transmit, or authenticate only | 
|---|
| 197 | * @send_sci: always include the SCI in the SecTAG | 
|---|
| 198 | * @end_station: | 
|---|
| 199 | * @scb: single copy broadcast flag | 
|---|
| 200 | * @sa: array of secure associations | 
|---|
| 201 | * @stats: stats for this TXSC | 
|---|
| 202 | * @md_dst: MACsec offload metadata dst | 
|---|
| 203 | */ | 
|---|
| 204 | struct macsec_tx_sc { | 
|---|
| 205 | bool active; | 
|---|
| 206 | u8 encoding_sa; | 
|---|
| 207 | bool encrypt; | 
|---|
| 208 | bool send_sci; | 
|---|
| 209 | bool end_station; | 
|---|
| 210 | bool scb; | 
|---|
| 211 | struct macsec_tx_sa __rcu *sa[MACSEC_NUM_AN]; | 
|---|
| 212 | struct pcpu_tx_sc_stats __percpu *stats; | 
|---|
| 213 | struct metadata_dst *md_dst; | 
|---|
| 214 | }; | 
|---|
| 215 |  | 
|---|
| 216 | /** | 
|---|
| 217 | * struct macsec_secy - MACsec Security Entity | 
|---|
| 218 | * @netdev: netdevice for this SecY | 
|---|
| 219 | * @n_rx_sc: number of receive secure channels configured on this SecY | 
|---|
| 220 | * @sci: secure channel identifier used for tx | 
|---|
| 221 | * @key_len: length of keys used by the cipher suite | 
|---|
| 222 | * @icv_len: length of ICV used by the cipher suite | 
|---|
| 223 | * @validate_frames: validation mode | 
|---|
| 224 | * @xpn: enable XPN for this SecY | 
|---|
| 225 | * @operational: MAC_Operational flag | 
|---|
| 226 | * @protect_frames: enable protection for this SecY | 
|---|
| 227 | * @replay_protect: enable packet number checks on receive | 
|---|
| 228 | * @replay_window: size of the replay window | 
|---|
| 229 | * @tx_sc: transmit secure channel | 
|---|
| 230 | * @rx_sc: linked list of receive secure channels | 
|---|
| 231 | */ | 
|---|
| 232 | struct macsec_secy { | 
|---|
| 233 | struct net_device *netdev; | 
|---|
| 234 | unsigned int n_rx_sc; | 
|---|
| 235 | sci_t sci; | 
|---|
| 236 | u16 key_len; | 
|---|
| 237 | u16 icv_len; | 
|---|
| 238 | enum macsec_validation_type validate_frames; | 
|---|
| 239 | bool xpn; | 
|---|
| 240 | bool operational; | 
|---|
| 241 | bool protect_frames; | 
|---|
| 242 | bool replay_protect; | 
|---|
| 243 | u32 replay_window; | 
|---|
| 244 | struct macsec_tx_sc tx_sc; | 
|---|
| 245 | struct macsec_rx_sc __rcu *rx_sc; | 
|---|
| 246 | }; | 
|---|
| 247 |  | 
|---|
| 248 | /** | 
|---|
| 249 | * struct macsec_context - MACsec context for hardware offloading | 
|---|
| 250 | * @netdev: a valid pointer to a struct net_device if @offload == | 
|---|
| 251 | *	MACSEC_OFFLOAD_MAC | 
|---|
| 252 | * @phydev: a valid pointer to a struct phy_device if @offload == | 
|---|
| 253 | *	MACSEC_OFFLOAD_PHY | 
|---|
| 254 | * @offload: MACsec offload status | 
|---|
| 255 | * @secy: pointer to a MACsec SecY | 
|---|
| 256 | * @rx_sc: pointer to a RX SC | 
|---|
| 257 | * @update_pn: when updating the SA, update the next PN | 
|---|
| 258 | * @assoc_num: association number of the target SA | 
|---|
| 259 | * @key: key of the target SA | 
|---|
| 260 | * @rx_sa: pointer to an RX SA if a RX SA is added/updated/removed | 
|---|
| 261 | * @tx_sa: pointer to an TX SA if a TX SA is added/updated/removed | 
|---|
| 262 | * @tx_sc_stats: pointer to TX SC stats structure | 
|---|
| 263 | * @tx_sa_stats: pointer to TX SA stats structure | 
|---|
| 264 | * @rx_sc_stats: pointer to RX SC stats structure | 
|---|
| 265 | * @rx_sa_stats: pointer to RX SA stats structure | 
|---|
| 266 | * @dev_stats: pointer to dev stats structure | 
|---|
| 267 | */ | 
|---|
| 268 | struct macsec_context { | 
|---|
| 269 | union { | 
|---|
| 270 | struct net_device *netdev; | 
|---|
| 271 | struct phy_device *phydev; | 
|---|
| 272 | }; | 
|---|
| 273 | enum macsec_offload offload; | 
|---|
| 274 |  | 
|---|
| 275 | struct macsec_secy *secy; | 
|---|
| 276 | struct macsec_rx_sc *rx_sc; | 
|---|
| 277 | struct { | 
|---|
| 278 | bool update_pn; | 
|---|
| 279 | unsigned char assoc_num; | 
|---|
| 280 | u8 key[MACSEC_MAX_KEY_LEN]; | 
|---|
| 281 | union { | 
|---|
| 282 | struct macsec_rx_sa *rx_sa; | 
|---|
| 283 | struct macsec_tx_sa *tx_sa; | 
|---|
| 284 | }; | 
|---|
| 285 | } sa; | 
|---|
| 286 | union { | 
|---|
| 287 | struct macsec_tx_sc_stats *tx_sc_stats; | 
|---|
| 288 | struct macsec_tx_sa_stats *tx_sa_stats; | 
|---|
| 289 | struct macsec_rx_sc_stats *rx_sc_stats; | 
|---|
| 290 | struct macsec_rx_sa_stats *rx_sa_stats; | 
|---|
| 291 | struct macsec_dev_stats  *dev_stats; | 
|---|
| 292 | } stats; | 
|---|
| 293 | }; | 
|---|
| 294 |  | 
|---|
| 295 | /** | 
|---|
| 296 | * struct macsec_ops - MACsec offloading operations | 
|---|
| 297 | * @mdo_dev_open: called when the MACsec interface transitions to the up state | 
|---|
| 298 | * @mdo_dev_stop: called when the MACsec interface transitions to the down | 
|---|
| 299 | *	state | 
|---|
| 300 | * @mdo_add_secy: called when a new SecY is added | 
|---|
| 301 | * @mdo_upd_secy: called when the SecY flags are changed or the MAC address of | 
|---|
| 302 | *	the MACsec interface is changed | 
|---|
| 303 | * @mdo_del_secy: called when the hw offload is disabled or the MACsec | 
|---|
| 304 | *	interface is removed | 
|---|
| 305 | * @mdo_add_rxsc: called when a new RX SC is added | 
|---|
| 306 | * @mdo_upd_rxsc: called when a certain RX SC is updated | 
|---|
| 307 | * @mdo_del_rxsc: called when a certain RX SC is removed | 
|---|
| 308 | * @mdo_add_rxsa: called when a new RX SA is added | 
|---|
| 309 | * @mdo_upd_rxsa: called when a certain RX SA is updated | 
|---|
| 310 | * @mdo_del_rxsa: called when a certain RX SA is removed | 
|---|
| 311 | * @mdo_add_txsa: called when a new TX SA is added | 
|---|
| 312 | * @mdo_upd_txsa: called when a certain TX SA is updated | 
|---|
| 313 | * @mdo_del_txsa: called when a certain TX SA is removed | 
|---|
| 314 | * @mdo_get_dev_stats: called when dev stats are read | 
|---|
| 315 | * @mdo_get_tx_sc_stats: called when TX SC stats are read | 
|---|
| 316 | * @mdo_get_tx_sa_stats: called when TX SA stats are read | 
|---|
| 317 | * @mdo_get_rx_sc_stats: called when RX SC stats are read | 
|---|
| 318 | * @mdo_get_rx_sa_stats: called when RX SA stats are read | 
|---|
| 319 | * @mdo_insert_tx_tag: called to insert the TX tag | 
|---|
| 320 | * @needed_headroom: number of bytes reserved at the beginning of the sk_buff | 
|---|
| 321 | *	for the TX tag | 
|---|
| 322 | * @needed_tailroom: number of bytes reserved at the end of the sk_buff for the | 
|---|
| 323 | *	TX tag | 
|---|
| 324 | * @rx_uses_md_dst: whether MACsec device offload supports sk_buff md_dst | 
|---|
| 325 | */ | 
|---|
| 326 | struct macsec_ops { | 
|---|
| 327 | /* Device wide */ | 
|---|
| 328 | int (*mdo_dev_open)(struct macsec_context *ctx); | 
|---|
| 329 | int (*mdo_dev_stop)(struct macsec_context *ctx); | 
|---|
| 330 | /* SecY */ | 
|---|
| 331 | int (*mdo_add_secy)(struct macsec_context *ctx); | 
|---|
| 332 | int (*mdo_upd_secy)(struct macsec_context *ctx); | 
|---|
| 333 | int (*mdo_del_secy)(struct macsec_context *ctx); | 
|---|
| 334 | /* Security channels */ | 
|---|
| 335 | int (*mdo_add_rxsc)(struct macsec_context *ctx); | 
|---|
| 336 | int (*mdo_upd_rxsc)(struct macsec_context *ctx); | 
|---|
| 337 | int (*mdo_del_rxsc)(struct macsec_context *ctx); | 
|---|
| 338 | /* Security associations */ | 
|---|
| 339 | int (*mdo_add_rxsa)(struct macsec_context *ctx); | 
|---|
| 340 | int (*mdo_upd_rxsa)(struct macsec_context *ctx); | 
|---|
| 341 | int (*mdo_del_rxsa)(struct macsec_context *ctx); | 
|---|
| 342 | int (*mdo_add_txsa)(struct macsec_context *ctx); | 
|---|
| 343 | int (*mdo_upd_txsa)(struct macsec_context *ctx); | 
|---|
| 344 | int (*mdo_del_txsa)(struct macsec_context *ctx); | 
|---|
| 345 | /* Statistics */ | 
|---|
| 346 | int (*mdo_get_dev_stats)(struct macsec_context *ctx); | 
|---|
| 347 | int (*mdo_get_tx_sc_stats)(struct macsec_context *ctx); | 
|---|
| 348 | int (*mdo_get_tx_sa_stats)(struct macsec_context *ctx); | 
|---|
| 349 | int (*mdo_get_rx_sc_stats)(struct macsec_context *ctx); | 
|---|
| 350 | int (*mdo_get_rx_sa_stats)(struct macsec_context *ctx); | 
|---|
| 351 | /* Offload tag */ | 
|---|
| 352 | int (*mdo_insert_tx_tag)(struct phy_device *phydev, | 
|---|
| 353 | struct sk_buff *skb); | 
|---|
| 354 | unsigned int needed_headroom; | 
|---|
| 355 | unsigned int needed_tailroom; | 
|---|
| 356 | bool rx_uses_md_dst; | 
|---|
| 357 | }; | 
|---|
| 358 |  | 
|---|
| 359 | void macsec_pn_wrapped(struct macsec_secy *secy, struct macsec_tx_sa *tx_sa); | 
|---|
| 360 | static inline bool macsec_send_sci(const struct macsec_secy *secy) | 
|---|
| 361 | { | 
|---|
| 362 | const struct macsec_tx_sc *tx_sc = &secy->tx_sc; | 
|---|
| 363 |  | 
|---|
| 364 | return tx_sc->send_sci || | 
|---|
| 365 | (secy->n_rx_sc > 1 && !tx_sc->end_station && !tx_sc->scb); | 
|---|
| 366 | } | 
|---|
| 367 | struct net_device *macsec_get_real_dev(const struct net_device *dev); | 
|---|
| 368 | bool macsec_netdev_is_offloaded(struct net_device *dev); | 
|---|
| 369 |  | 
|---|
| 370 | static inline void *macsec_netdev_priv(const struct net_device *dev) | 
|---|
| 371 | { | 
|---|
| 372 | #if IS_ENABLED(CONFIG_VLAN_8021Q) | 
|---|
| 373 | if (is_vlan_dev(dev)) | 
|---|
| 374 | return netdev_priv(vlan_dev_priv(dev)->real_dev); | 
|---|
| 375 | #endif | 
|---|
| 376 | return netdev_priv(dev); | 
|---|
| 377 | } | 
|---|
| 378 |  | 
|---|
| 379 | static inline u64 sci_to_cpu(sci_t sci) | 
|---|
| 380 | { | 
|---|
| 381 | return be64_to_cpu((__force __be64)sci); | 
|---|
| 382 | } | 
|---|
| 383 |  | 
|---|
| 384 | #endif /* _NET_MACSEC_H_ */ | 
|---|
| 385 |  | 
|---|